When trying to unmount a device it is reported as being busy. Which of the following commands could be used to determine which process is causing this?
A. debug
B. lsof
C. nessus
D. strace
E. traceroute
Question 1
When trying to unmount a device it is reported as being busy. Which of the following commands could be used to determine which process is causing this?
A. debug
B. lsof
C. nessus
D. strace
E. traceroute
Which command is used to set restrictions on the size of a core file that is created for a user when a program crashes?
A. core
B. edquota
C. ulimit
D. quota
C
Which configuration file would be edited to change the default options for outbound SSH sessions?
A. /etc/ssh/sshd_config
B. /etc/ssh/ssh
C. /etc/ssh/client
D. /etc/ssh/ssh_config
E. /etc/ssh/ssh_client
Which of the following programs uses the hosts.allow file to perform its main task of checking for access control restrictions to system services?
A. tcpd
B. inetd
C. fingerd
D. mountd
E. xinetd
SIMULATION
With X11 forwarding in ssh, what environment variable is automatically set in the remote host shell that is not set when X11 forwarding is not enabled?
(Specify only the environment variable without any additional commands or values.)
SIMULATION
What argument to the -type option of find will match files that are symbolic links? (Specify only the argument and no other options or words.)
l
THAKS
L?
l
SIMULATION
Which keyword must be listed in the hosts option of the Name Service Switch configuration file in order to make host lookups consult the /etc/hosts file?
On a regular users workstation the route command takes a long time before printing out the routing table. Which of the following errors does that indicate?
A. The local routing information may be corrupted and must be re-validated using a routing protocol.
B. One of the routers in the routing table is not available which causes the automatic router failure detection mechanism (ARF-D) to wait for a timeout.
C. There may accidentally be more than one default router in which case a default router election has to be done on the network in order to choose one router as the default.
D. DNS resolution may not be working as route by default tries to resolve names of routers and destinations and may run into a timeout.
Given the following routing table:

How would an outgoing packet to the destination 192.168.2.150 be handled?
A. It would be passed to the default router 192.168.178.1 on wlan0.
B. It would be directly transmitted on the device eth0.
C. It would be passed to the default router 255.255.255.0 on eth0.
D. It would be directly transmitted on the device wlan0.
E. It would be passed to the router 192.168.1.1 on eth0.
What of the following can be done by the command ifconfig? (Choose TWO correct answers.)
A. Set a network interface active or inactive.
B. Specify the kernel module to be used with a network interface.
C. Allow regular users to change the network configuration of a network interface.
D. Change the netmask used on a network interface.
E. Specify which network services are available on a network interface.
Which of the following tools used for DNS debugging, reports not only the response from the name server but also details about the query?
A. dnsq
B. dig
C. hostname
D. dnslookup
E. zoneinfo
Which of the following IPv4 networks are reserved by IANA for private address assignment and private routing? (Choose THREE correct answers.)
A. 127.0.0.0/8
B. 10.0.0.0/8
C. 169.255.0.0/16
D. 172.16.0.0/12
E. 192.168.0.0/16
SIMULATION
Which command, depending on its options, can display the open network connections, the routing tables, as well as network interface statistics. (Specify ONLY the command without any path or parameters.)
What is true regarding TCP port 23?
A. Port 23 is the well known port for the telnet service which is a plain text protocol that should no longer be used.
B. Port 23 is the well known port for the SSH service which provides secure logins.
C. Port 23 is the well known port for the rlogin service which is SSL secured by default.
D. Port 23 is the well known port for the system login services which are encrypted when the user runs the starttls command in his login shell.
Which of the following may occur as a consequence of using the command ifconfig? (Choose THREE correct answers.)
A. New name servers may be added to the resolver configuration.
B. Network interfaces may become active or inactive.
C. The routing table may change.
D. IP addresses may change.
E. The system’s host name may change.
Which of the following keywords can be used in the file /etc/nsswitch.conf to specify a source for host name lookups? (Choose TWO correct answers.)
A. resolv
B. dns
C. remote
D. files
E. hosts
Which of the following lines are valid in the file /etc/hosts? (Choose TWO correct answers.)
A. 2001:db8::15 www.example.com www
B. www.example.com www 203.0.13.15
C. 203.0.113.15 www.example.com www
D. www.example.com,www 203.0.13.15,2001:db8::15
E. 2003.0.113.15,2001:db8::15 www.example.com www
What is true regarding a default route?
A. The default route is always used first. When the default route is not available more specific routes are tried.
B. When a default route is set, all other routes are disabled until the default route is deleted.
C. The default route is only used if there is not a more specific route to a destination host or network.
D. Without a default route, no network communication even in directly attached networks is possible.
Which of the following is true about IPv6?
A. With IPv6, the TCP port numbers of most services have changed.
B. IPv6 no longer supports broadcast addresses.
C. IPv4 addresses can be used without any change with IPv6.
D. IPv6 no longer supports multicast addresses.
E. For IPv6, UDP and TCP have been replaced by the Rapid Transmission Protocol RTP.
Which of the following details is NOT provided in any output from the netstat utility?
A. broadcast services
B. interface statistics
C. masquerading connections
D. network connections
E. routing tables
What is the purpose of the nsswitch.conf file?
A. It is used to configure where the C library looks for system information such as host names and user passwords.
B. It is used to configure network protocol port numbers such as for HTTP or SMTP.
C. It is used to configure LDAP authentication services for the local system.
D. It is used to configure which network services will be turned on during the next system boot.
What is the command to delete the default gateway from the system IP routing table? (Choose TWO correct answers.)
A. route del default
B. ifconfig unset default
C. netstat -r default
D. ip route del default
E. sysctl ipv4.default_gw=0
What is true regarding the file ~/.forward?
A. As it is owned by the MTA and not writable by the user, it must be edited using the editaliases command.
B. After editing ~/.forward the user must run newaliases to make the mail server aware of the changes.
C. Using ~/.forward, root may configure any email address whereas all other users may configure only their own addresses.
D. When configured correctly, ~/.forward can be used to forward each incoming mail to more than one other recipient.
What entry can be added to the syslog.conf file to have all syslog messages generated by a system displayed on console 12?
A. *.* /dev/tty12
B. /var/log/messages | /dev/tty12
C. | /dev/tty12
D. syslog tty12
E. mail.* /dev/tty12
What is true about the ntpdate command?
A. It is the primary management command for the NTP time server.
B. It updates the local system’s date (i.e. day, month and year) but not the time (i.e. hours, minutes, seconds).
C. It queries one or more NTP time servers and adjusts the system time accordingly.
D. It sends the local system time to one or many remote NTP time servers for redistribution.
E. It can be used by any user to set the user clock independently of the system clock.
Which of the following is observed and corrected by a NTP client?
A. The skew in time between the system clock and the hardware clock.
B. The skew in time between the system clock and the reference clock.
C. Changes in the time zone of the current computer’s location.
D. Adjustments needed to support Daylight Saving Time.
Why is the correct configuration of a system’s time zone important?
A. Because the conversion of Unix timestamps to local time relies on the time zone configuration.
B. Because the time zone is saved as part of the modification times of files and cannot be changed after a file is created.
C. Because the environment variables LANG and LC_MESSAGES are, by default, set according to the time zone.
D. Because NTP chooses servers nearby based on the configured time zone.
What is true regarding the command sendmail?
A. With any MTA, the sendmail command must be run periodically by the cron daemon.
B. All MTAs, including Postfix and Exim, provide a sendmail command.
C. The sendmail command prints the MTAs queue history of which mails have been sent successfully.
D. It is only available when the sendmail MTA is installed.
What is the purpose of the command mailq?
A. It fetches new emails from a remote server using POP3 or IMAP.
B. It is a multi-user mailing list manager.
C. It is a proprietary tool contained only in the qmail MTA.
D. It queries the mail queue of the local MTA.
E. It is a command-line based tool for reading and writing emails.
Which of the following tasks can be accomplished using the command date? (Choose TWO correct answers.)
A. Synchronize the hardware and system clocks.
B. Output date and time in different formats.
C. Set the system clock.
D. Set the hardware clock.
E. Update the time via NTP.
SIMULATION
After configuring printing on a Linux server, the administrator sends a test file to one of the printers and it fails to print. What command can be used to display the status of the printer’s queue? (Specify ONLY the command without any path or parameters.)
SIMULATION
Which option in the /etc/ntp.conf file specifies an external NTP source to be queried for time information? (Specify ONLY the option without any values or parameters.)
Which of the following fields can be found in the /etc/group file? (Choose THREE correct answers.)
A. The list of users that belong to the group.
B. The home directory of the group.
C. The name of the group.
D. The description of the group.
E. The password of the group.
What is true regarding the command userdel –force –remove bob? (Choose TWO correct answers.)
A. The user bob is removed from the system’s user database.
B. The user bob’s home directory is removed.
C. The locate database is updated to drop files owned by bob.
D. All files owned by bob are remove from all mounted filesystems.
E. In case bob was the last member of a group, that group is deleted.
What is true about the file /etc/localtime?
A. It is a plain text file containing a string such as Europe/Berlin.
B. It is created and maintained by the NTP service based on the geolocation of the system’s IP address.
C. It is a symlink to /sys/device/clock/ltime and always contains the current local time.
D. It is either a symlink to or a copy of a timezone information file such as /usr/share/zoneinfo/Europe/Berlin.
Which of the following commands should be added to /etc/bash_profile in order to change the language of messages for an internationalized program to Portuguese (pt)?
A. export LANGUAGE="pt"
B. export MESSAGE="pt"
C. export UI_MESSAGES="pt"
D. export LC_MESSAGES="pt"
E. export ALL_MESSAGES="pt"
Which of the following crontab entries will execute myscript at 30 minutes past every hour on Sundays?
A. 0 * * * 30 myscript
B. 30 * * * 6 myscript
C. 30 0 * * 0 myscript
D. 30 0-23 * * 0 myscript
E. 0 0-23 * * 30 myscript
thaks…u right
0 at the end?is it true?
Sunday is day 0 and day 7 in the crontab file
it’s true. Sundey =0, Saturday=6
To prevent a specific user from scheduling tasks with at, what should the administrator do?
A. Add the specific user to /etc/at.allow file.
B. Add the specific user to [deny] section in the /etc/atd.conf file.
C. Add the specific user to /etc/at.deny file.
D. Add the specific user to nojobs group.
E. Run the following: atd –deny [user].
SIMULATION
Which environment variable should be set in order to change the time zone for the commands run from within the environment variable’s scope?
(Specify the variable name only.)
Where are user specific crontabs stored?
A. In the database file /etc/crontab.db which is shared by all users.
B. As individual per-user files within /var/spool/cron.
C. As individual per-user files in /etc/cron.user.d.
D. In the .crontab file in the user’s home directory.
E. In the file /var/cron/user-crontab which is shared by all users.
In case neither cron.allow nor cron.deny exist in /etc/, which of the following is true?
A. Without additional configuration, no users may have user specific crontabs.
B. Without additional configuration, all users may have user specific crontabs.
C. The cron daemon will refuse to start and report missing files in the system’s logfile.
D. When a user creates a user specific crontab the system administrator must approve it explicitly.
Thanks bro
Answer A is wrong. This would by the behaviour of atd and is not the one of crond.
Due Answer B is right.
Thats not entirely correct, in a Red Hat Distribution A is correct. In Debian its B.
very good Marius!thkx
What is the purpose of the iconv command?
A. It converts bitmap images from one format to another such as PNG to JPEG.
B. It verifies that the root directory tree complies to all conventions from the Filesystem Hierarchy Standard (FHS).
C. It displays additional meta information from icon files ending in .ico.
D. It changes the mode of an inode in the ext4 file system.
E. It converts files from one character encoding to another.
Which of the following fields are available in both the global /etc/crontab file as well as in user-specific crontab files? (Select TWO correct answers)
A. Year
B. Minute
C. Username
D. Command
Which of the following steps prevents a user from obtaining an interactive login session?
A. Run the command chsh -s /bin/false with the user name.
B. Set the UID for the user to 0.
C. Remove the user from the group staff.
D. Add the user to /etc/noaccess.
E. Create a .nologin file in the user’s home directory.
Which of the following are tasks handled by a display manager like XDM or KDM? (Choose TWO correct answers.)
A. Start and prepare the desktop environment for the user.
B. Configure additional devices like new monitors or projectors when they are attached.
C. Handle the login of a user.
D. Lock the screen when the user was inactive for a configurable amount of time.
E. Create an X11 configuration file for the current graphic devices and monitors.
What is the purpose of a screen reader?
A. It reads text displayed on the screen to blind or visually impaired people.
B. It reads the parameters of the attached monitors and creates an appropriate X11 configuration.
C. It displays lines and markers to help people use speed reading techniques.
D. It manages and displays files that contain e-books.
How is a display manager started?
A. It is started by a user using the command startx.
B. It is started like any other system service by the init system.
C. It is started by inetd when a remote hosts connects to the X11 port.
D. It is started automatically when a X11 user logs in to the system console.
SIMULATION
Which command can be used to investigate the properties for a particular window in X by clicking that window? (Specify ONLY the command without any path or parameters.)
The X11 configuration file xorg.conf is grouped into sections. How is the content of the section SectionName associated with that section?
A. It is placed in curly brackets as in Section SectionName { … }.
B. It is placed between a line containing Section "SectionName" and a line containing EndSection.
C. It is placed between the tags <Section name="SectionName"> and </Section>
D. It is placed after the row [SectionName].
E. It is placed after an initial unindented Section "SectionName" and must be indented by exactly one tab character.
Which of the following are requirements in order to run a shell script like a regular command from anywhere in the filesystem? (Choose THREE correct answers.)
A. The user issuing the command must be in the group script.
B. The script file must be found in the $PATH.
C. The script file must have the executable permission bit set.
D. The script must begin with a shebang-line (#!) that points to the correct interpreter.
E. The file system on which the script resides must be mounted with the option scripts.
What is the purpose of the file /etc/profile?
A. It contains the welcome message that is displayed after login.
B. It contains security profiles defining which users are allowed to log in.
C. It contains environment variables that are set when a user logs in.
D. It contains default application profiles for users that run an application for the first time.
Which of the following SQL queries counts the number of occurrences for each value of the field order_type in the table orders?
A. SELECT order_type,COUNT(*) FROM orders WHERE order_type=order_type;
B. SELECT order_type,COUNT(*) FROM orders GROUP BY order_type;
C. COUNT(SELECT order_type FROM orders);
D. SELECT COUNT(*) FROM orders ORDER BY order_type;
E. SELECT AUTO_COUNT FROM orders COUNT order_type;
Which of the following words is used to restrict the records that are returned from a SELECT SQL query based on a supplied criteria for the values in the records?
A. CASE
B. FROM
C. WHERE
D. IF
What output will the following command produce?
seq 1 5 20
A. 1
6
1
1
1
6
B. 1
5
10
15
C. 1
2
3
4
D. 2
3
4
5
E. 5
10
15
20
Just a doubt… the correct answer could be the following ?
1
6
11
16
yeah that is correct
Yeah, it is correct answer. But A) is printed badly
When the command echo $$ outputs 12942, what is the meaning of 12942?
A. It is the process ID of the echo command.
B. It is the process ID of the current shell.
C. It is the process ID of the last command executed.
D. It is the process ID of the last command which has been placed in the background.
How can the existing environment variable FOOBAR be suppressed for the execution of the script./myscript only?
A. unset -v FOOBAR;./myscript
B. set -a FOOBAR="";./myscript
C. env -u FOOBAR./myscript
D. env -i FOOBAR./myscript
What is the difference between the commands test -e path and test -f path?
A. They are equivalent options with the same behaviour.
B. The -f option tests for a regular file. The -e option tests for an empty file.
C. Both options check the existence of the path. The -f option also confirms that it is a regular file.
D. The -f option tests for a regular file. The -e option tests for an executable file.
Which of the following commands puts the output of the command date into the shell variable mydate?
A. mydate="$(date)"
B. mydate="exec date"
C. mydate="$((date))"
D. mydate="date"
E. mydate="${date}"
SIMULATION
By default, the contents of which directory will be copied to a new user’s home directory when the account is created by passing the -m option to the useradd command? (Specify the full path to the directory.)
What output will the command seq 10 produce?
A. A continuous stream of numbers increasing in increments of 10 until stopped.
B. The numbers 1 through 10 with one number per line.
C. The numbers 0 through 9 with one number per line.
D. The number 10 to standard output.
When the command echo $ outputs 1, which of the following statements is true?
A. It is the process ID of the echo command.
B. It is the process ID of the current shell.
C. It is the exit value of the command executed immediately before echo.
D. It is the exit value of the echo command.
I believe it should be “When the command echo $? outputs 1, which of the following statements is true?”
the question is, what does echo $! output
What output will the following command sequence produce?
echo ‘1 2 3 4 5 6’ | while read a b c; do
echo result: $c $b $a;
done
A. result: 3 4 5 6 2 1
B. result: 1 2 3 4 5 6
C. result: 6 5 4
D. result: 6 5 4 3 2 1
E. result: 3 2 1
B